US7496762B1 - Security architecture for modified segregated environment for federal telecom services - Google Patents
Security architecture for modified segregated environment for federal telecom services Download PDFInfo
- Publication number
- US7496762B1 US7496762B1 US10/960,536 US96053604A US7496762B1 US 7496762 B1 US7496762 B1 US 7496762B1 US 96053604 A US96053604 A US 96053604A US 7496762 B1 US7496762 B1 US 7496762B1
- Authority
- US
- United States
- Prior art keywords
- data
- enterprise
- government
- user interface
- service broker
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
Definitions
- the present invention relates to secure storage and processing of data within a computing system. More particularly, embodiments of the present invention provide a security architecture for modified segregated environment for federal telecommunications services.
- An enterprise providing a service to a client might have a computing system that stores and processes client-related data.
- the enterprise would typically implement well-known security measures such as authentication and authorization to prevent unauthorized parties from gaining access to the data.
- Some clients might require that their data receive a higher level of security than what the enterprise typically provides.
- One embodiment provides a security architecture for telecommunications services including a first and second user interfaces, a first and second web servers, a service broker, a plurality of application servers, and a plurality of data stores.
- the first user interface is for enterprise users to access an enterprise.
- the first web server communicates with the first user interface.
- the plurality of application servers run one or more enterprise applications.
- the plurality of data stores communicate with the enterprise applications.
- a customer data is stored on a first portion of one or more of the plurality of data stores and a government data is stored on a second portion of the one or more of the plurality of data stores.
- the second user interface is for access to an enterprise by government users.
- the second web server communicates with the second user interface.
- the service broker receives requests from the second web server related to the government data and authorizes at least one of the enterprise applications to access the government data stored on the second portion of the one or more of the plurality of data stores.
- An alternative embodiment provides a method of securing federal telecommunications services.
- the method includes accessing an enterprise via a government provided user interface, and accessing, via the government provided user interface, a dedicated enterprise web server.
- the method includes managing transactions related to the government data using a dedicated service broker.
- the method includes authorizing, by the service broker, enterprise applications to execute transactions of involving government data.
- the method also provides for storing at least a portion of the government data in an enterprise data store having a separate partition for the government data. At least a portion of the communication between the enterprise application and the enterprise data store is accomplished via a secure communication line.
- FIG. 1 is a block diagram of an embodiment of a security system.
- FIG. 2 is a block diagram of a computing system.
- systems and methods are provided that allow an enterprise to store and process data for a client with stringent data security requirements on the same computing equipment that is used to store and process data for clients with less strict security policies.
- the client with stringent data security requirements will be referred to herein as a government agency and the client's data will be referred to as government data, but it should be understood that the client is not necessarily a governmental entity or agency and may be any customer desirous of implementing a heightened level of security.
- government data physically resides in databases or other storage media in the enterprise's computing system, but is in partitions that are logically separate from the data of other clients.
- the data When data is entered into the enterprise's computing system, the data is linked to account information that is flagged to indicate if it is government data or data pertaining to another client.
- the identifier identifying the government data may include a unique field, or element of data. If it is government data, it is sent to the separate logical database where only government data resides.
- security measures ensure that only the government agency can gain access to the separate logical database.
- all security, logging, auditing, and reporting functions for the government data are centralized in a single component that can be referred to as a service broker.
- the service broker acts as a proxy so that when the government agency wants to access its data, the service broker works on behalf of the government agency to allow access.
- security is added at multiple locations in the computing system with the addition of the service broker in only one location. This allows the enterprise to enforce a higher level of security for some transactions without altering its existing computing system architecture.
- FIG. 1 illustrates an embodiment of a computing system that uses a service broker to provide data security.
- a government agency has its own user interface 10 which is separate from the user interface 12 used by all other clients.
- the government user interface 10 accesses a web server 20 that is separate from a web server 22 that is accessed by the interface 12 used by other users.
- the web server 20 may be dedicated for use via the government user interface 10 .
- both interfaces 10 and 12 access a single web server.
- the government web server 20 provides access to the service broker 30 .
- the security measures that control access to the service broker 30 via the government user interface 10 and the government web server 20 are the standard login procedures already in use by the government agency for secure access to its own computing systems. These security measures may include, for example, standard user name and password authentication and authorization.
- the service broker 30 can allow secure access to the enterprise's back end data processing and data storage systems. These systems are depicted in FIG. 1 as application servers 40 and 42 and data stores 50 , 60 , and 70 , but other numbers and types of computing system components could be present.
- the application servers 40 and 42 and data stores 50 , 60 , and 70 that are accessible through the service broker 30 may be the same application servers 40 and 42 and physical data stores 50 , 60 , and 70 that other users can reach via the other interface 12 and web server 22 .
- each physical data store 50 , 60 , and 70 contains a logical partition that can be accessed only through the service broker 30 .
- government data is placed in one of these partitions, only the government agency can access the data using the services of the service broker 30 .
- Data going into or coming out of one of these data store partitions can be flagged to indicate that the data should be processed differently from the data of other clients.
- every message or request initiating from, and/or directed or related to the government user interface 10 funneled through the service broker 30 for more complete monitoring and management of government data.
- data passing through the service broker 30 may be encrypted, by the service broker 30 or otherwise, and communicated and stored in an encrypted state.
- the data may be both encrypted and stored on partitioned storage devices accessible only from the service broker 30 .
- the application servers 40 and 42 have the ability to determine if a data request is coming from the service broker 30 or from the web server 22 that is accessible to other clients. If a request comes from the web server 22 , it is processed in a normal manner. All requests coming from the service broker 30 are logged and subjected to stricter security measures, such as encryption of data and communications between enterprise applications, components or systems.
- a virtual private network is created between the service broker 30 , the application servers 40 and 42 , and the government data partitions of the data stores 50 , 60 , and 70 .
- VPN virtual private network
- the VPN gives the government agency communications exclusive access to its partitions in the data stores 50 , 60 , and 70 .
- the VPN may be static or always in place, or dynamically created.
- the service broker 30 may direct a dedicated communication channel between the service broker 30 and application server 40 or data store 50 .
- the system may dynamically create or allocate VPN resources for this communication.
- dedicated communication lines or facilities may be employed instead of, or in conjunction with, VPNs.
- each communication between the application server 40 or 42 and the government data partition of the data store 50 , 60 , or 70 is managed by the service broker 30 .
- the service broker 30 informs the application server 40 or 42 whether the application server 40 or 42 is authorized to fill the request.
- the application servers 40 or 42 request authorization from service broker 30 in order to perform any action on government data.
- the application server 40 or 42 seeks authorization from the service broker 30 for each transaction.
- the application server 40 or 42 obtains a one-time token from the service broker 30 and thereafter uses the token to authenticate itself to a government data partition of the data store 50 , 60 , or 70 .
- Other techniques employed by the service broker 30 to authorize and authenticate systems working with government data will readily suggest themselves to one skilled in the art.
- the service broker 30 restricts access to the government data partitions of the data stores 50 , 60 , and 70 to only authenticated and authorized users that have reached the service broker 30 through the government user interface 10 and the web server 20 . This can fulfill the requirement that government data be kept logically separate from other data. By logging all transactions involving government data, the service broker 30 can centralize the functions in relation to logging, auditing, and reporting that a government agency might demand. It is readily apparent that the location of the service broker 30 provides for tracking every aspect of the government data with minimal modifications to the enterprise, while providing access to the enterprise resources.
- the service broker 30 may communicate directly or through a data layer (not shown) with the data stores 50 , 60 , and 70 , via a communication line (not shown), to more directly manage the government data for additional security.
- FIG. 2 illustrates a typical, general-purpose computer system suitable for implementing one or more embodiments disclosed herein.
- the computer system 1300 includes a processor 1332 (which may be referred to as a central processor unit or CPU) that is in communication with memory devices including secondary storage 1338 , read only memory (ROM) 1336 , random access memory (RAM) 1334 , input/output (I/O) 1340 devices, and network connectivity devices 1312 .
- the processor 1332 may be implemented as one or more CPU chips.
- the secondary storage 1338 is typically comprised of one or more disk drives or tape drives and is used for non-volatile storage of data and as an over-flow data storage device if RAM 1334 is not large enough to hold all working data. Secondary storage 1338 may be used to store programs that are loaded into RAM 1334 when such programs are selected for execution.
- the ROM 1336 is used to store instructions and perhaps data that are read during program execution. ROM 1336 is a non-volatile memory device that typically has a small memory capacity relative to the larger memory capacity of secondary storage.
- the RAM 1334 is used to store volatile data and perhaps to store instructions. Access to both ROM 1336 and RAM 1334 is typically faster than to secondary storage 1338 .
- I/O devices 1340 may include printers, video monitors, liquid crystal displays (LCDs), touch screen displays, keyboards, keypads, switches, dials, mice, track balls, voice recognizers, card readers, paper tape readers, or other well-known input devices.
- the network connectivity devices 1312 may take the form of modems, modem banks, ethernet cards, universal serial bus (USB) interface cards, serial interfaces, token ring cards, fiber distributed data interface (FDDI) cards, wireless local area network (WLAN) cards, radio transceiver cards such as Global System for Mobile Communications (GSM) radio transceiver cards, and other well-known network devices.
- FDDI fiber distributed data interface
- WLAN wireless local area network
- radio transceiver cards such as Global System for Mobile Communications (GSM) radio transceiver cards, and other well-known network devices.
- GSM Global System for Mobile Communications
- the processor 1332 might receive information from the network, or might output information to the network in the course of performing the above-described method steps. Such information, which is often represented as a sequence of instructions to be executed using processor 1332 , may be received from and outputted to the network, for example, in the form of a computer data signal embodied in a carrier wave.
- Such information may be received from and outputted to the network, for example, in the form of a computer data baseband signal or signal embodied in a carrier wave.
- the baseband signal or signal embodied in the carrier wave generated by the network connectivity devices 1312 may propagate in or on the surface of electrical conductors, in coaxial cables, in waveguides, in optical media, for example optical fiber, or in the air or free space.
- the information contained in the baseband signal or signal embedded in the carrier wave may be ordered according to different sequences, as may be desirable for either processing or generating the information or transmitting or receiving the information.
- the baseband signal or signal embedded in the carrier wave, or other types of signals currently used or hereafter developed, referred to herein as the transmission medium may be generated according to several methods well known to one skilled in the art.
- the processor 1332 executes instructions, codes, computer programs, scripts which it accesses from hard disk, floppy disk, optical disk (these various disk based systems may all be considered secondary storage 1338 ), ROM 1336 , RAM 1334 , or the network connectivity devices 1312 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (21)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/960,536 US7496762B1 (en) | 2004-10-07 | 2004-10-07 | Security architecture for modified segregated environment for federal telecom services |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/960,536 US7496762B1 (en) | 2004-10-07 | 2004-10-07 | Security architecture for modified segregated environment for federal telecom services |
Publications (1)
Publication Number | Publication Date |
---|---|
US7496762B1 true US7496762B1 (en) | 2009-02-24 |
Family
ID=40364711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/960,536 Expired - Fee Related US7496762B1 (en) | 2004-10-07 | 2004-10-07 | Security architecture for modified segregated environment for federal telecom services |
Country Status (1)
Country | Link |
---|---|
US (1) | US7496762B1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090187633A1 (en) * | 2006-05-02 | 2009-07-23 | Airwide Solutions Oy | Capability broker and messaging system |
WO2014014747A3 (en) * | 2012-07-18 | 2014-03-13 | Zixcorp Systems, Inc. | Secure data access for multi-purpose mobile devices |
US9692848B2 (en) | 2014-09-24 | 2017-06-27 | Zixcorp Systems, Inc. | Preemptive loading of protected data for streaming mobile devices |
US11856032B2 (en) * | 2012-12-28 | 2023-12-26 | Intel Corporation | Policy-based secure containers for multiple enterprise applications |
US20240039914A1 (en) * | 2020-06-29 | 2024-02-01 | Cyral Inc. | Non-in line data monitoring and security services |
CN118469573A (en) * | 2024-05-09 | 2024-08-09 | 广东软易通信息科技有限公司 | A method and device for supervising enterprise funds |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5829003A (en) * | 1995-05-23 | 1998-10-27 | Casio Computer Co., Ltd. | Record processing apparatus, method and computer readable storage having attribute information representing a hierarchical connection for display of data |
US6112188A (en) * | 1992-10-30 | 2000-08-29 | Hartnett; William J. | Privatization marketplace |
US6375466B1 (en) * | 1999-04-23 | 2002-04-23 | Milan Juranovic | Method for teaching economics, management and accounting |
US20030021417A1 (en) * | 2000-10-20 | 2003-01-30 | Ognjen Vasic | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data |
US20040181461A1 (en) * | 2003-03-14 | 2004-09-16 | Samir Raiyani | Multi-modal sales applications |
US7069447B1 (en) * | 2001-05-11 | 2006-06-27 | Rodney Joe Corder | Apparatus and method for secure data storage |
US20060271563A1 (en) * | 2001-05-15 | 2006-11-30 | Metatomix, Inc. | Appliance for enterprise information integration and enterprise resource interoperability platform and methods |
-
2004
- 2004-10-07 US US10/960,536 patent/US7496762B1/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6112188A (en) * | 1992-10-30 | 2000-08-29 | Hartnett; William J. | Privatization marketplace |
US5829003A (en) * | 1995-05-23 | 1998-10-27 | Casio Computer Co., Ltd. | Record processing apparatus, method and computer readable storage having attribute information representing a hierarchical connection for display of data |
US6375466B1 (en) * | 1999-04-23 | 2002-04-23 | Milan Juranovic | Method for teaching economics, management and accounting |
US20030021417A1 (en) * | 2000-10-20 | 2003-01-30 | Ognjen Vasic | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data |
US7069447B1 (en) * | 2001-05-11 | 2006-06-27 | Rodney Joe Corder | Apparatus and method for secure data storage |
US20060271563A1 (en) * | 2001-05-15 | 2006-11-30 | Metatomix, Inc. | Appliance for enterprise information integration and enterprise resource interoperability platform and methods |
US20040181461A1 (en) * | 2003-03-14 | 2004-09-16 | Samir Raiyani | Multi-modal sales applications |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090187633A1 (en) * | 2006-05-02 | 2009-07-23 | Airwide Solutions Oy | Capability broker and messaging system |
US7886052B2 (en) * | 2006-05-02 | 2011-02-08 | Airwide Solutions Oy | Capability broker and messaging system |
WO2014014747A3 (en) * | 2012-07-18 | 2014-03-13 | Zixcorp Systems, Inc. | Secure data access for multi-purpose mobile devices |
US10409982B2 (en) | 2012-07-18 | 2019-09-10 | Zixcorp Systems, Inc. | Secure data access for multi-purpose mobile devices |
US11856032B2 (en) * | 2012-12-28 | 2023-12-26 | Intel Corporation | Policy-based secure containers for multiple enterprise applications |
US12184704B2 (en) | 2012-12-28 | 2024-12-31 | Intel Corporation | Policy-based secure containers for multiple enterprise applications |
US9692848B2 (en) | 2014-09-24 | 2017-06-27 | Zixcorp Systems, Inc. | Preemptive loading of protected data for streaming mobile devices |
US20240039914A1 (en) * | 2020-06-29 | 2024-02-01 | Cyral Inc. | Non-in line data monitoring and security services |
CN118469573A (en) * | 2024-05-09 | 2024-08-09 | 广东软易通信息科技有限公司 | A method and device for supervising enterprise funds |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11354429B2 (en) | Device and methods for management and access of distributed data sources | |
US8918856B2 (en) | Trusted intermediary for network layer claims-enabled access control | |
US7571473B1 (en) | Identity management system and method | |
KR100389160B1 (en) | Method and apparatus to permit automated server determination for foreign system login | |
US9686262B2 (en) | Authentication based on previous authentications | |
US9344432B2 (en) | Network layer claims based access control | |
US8353002B2 (en) | Chaining information card selectors | |
JP5497065B2 (en) | Secure system access without password sharing | |
US9043589B2 (en) | System and method for safeguarding and processing confidential information | |
US8131830B2 (en) | System and method for providing support services using administrative rights on a client computer | |
WO2005069823A2 (en) | Centralized transactional security audit for enterprise systems | |
EP4278566A1 (en) | Limiting scopes in token-based authorization systems | |
US20040260946A1 (en) | User not present | |
US9059987B1 (en) | Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network | |
CN110417820A (en) | Processing method, device and the readable storage medium storing program for executing of single-node login system | |
US11750397B2 (en) | Attribute-based encryption keys as key material for key-hash message authentication code user authentication and authorization | |
US20080229396A1 (en) | Issuing a command and multiple user credentials to a remote system | |
CN1601954B (en) | Moving principals across security boundaries without service interruption | |
US7496762B1 (en) | Security architecture for modified segregated environment for federal telecom services | |
CN106936760A (en) | A kind of apparatus and method of login Openstack cloud system virtual machines | |
CN106603567A (en) | WEB administrator login management method and device | |
CN117540361A (en) | Single sign-on authentication method, device, apparatus, medium and program product | |
KR20020032892A (en) | Integrated Management System And Method For User Password Of Multi UNIX Server | |
EP2790123A1 (en) | Generating A Data Audit Trail For Cross Perimeter Data Transfer | |
CN119402221A (en) | Data cross-region and cross-domain sharing dynamic management and control architecture, method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SPRINT COMMUNICATIONS COMPANY, L.P., KANSAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BOYDSTUN, KENNETH C.;PARK, PAUL H.;HUDOK, JR., KENNETH THOMAS;AND OTHERS;REEL/FRAME:015882/0260;SIGNING DATES FROM 20040920 TO 20040928 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
AS | Assignment |
Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, NEW YORK Free format text: GRANT OF FIRST PRIORITY AND JUNIOR PRIORITY SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:SPRINT COMMUNICATIONS COMPANY L.P.;REEL/FRAME:041895/0210 Effective date: 20170203 |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20170224 |
|
AS | Assignment |
Owner name: SPRINT COMMUNICATIONS COMPANY L.P., KANSAS Free format text: TERMINATION AND RELEASE OF FIRST PRIORITY AND JUNIOR PRIORITY SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS;REEL/FRAME:052969/0475 Effective date: 20200401 |